Volume: 3 Issue: 5
ISSN: 2321-8169
2906 2909
_______________________________________________________________________________________________
Prof.Dhanashree Kulkarni
Computer Department
Dr.D.Y.Patil College of Engineering
Pune, India
patilaparna.4@gmail.com
Computer Department
Dr.D.Y.Patil College of Engineering
Pune,India
dskulkarni10@gmail.com
Abstract Data deduplication is one of the most important Data compression techniques used for to removing the identical copies of repeating
data and it is used in the cloud storage for the purpose of reduce the storage space as well as save bandwidth. To retain the confidentiality of
sensitive data while supporting the deduplication, to encrypt the data before outsourcing convergent encryption technique has been proposed .
This project makes the first attempt to formally address the problem of authorized data deduplication giving better protect data security,
Different from the traditional deduplication system, distinctive benefits of the user are further considered the duplicate check besides the data
itself. Hybrid cloud architecture having various new deduplication constructions supporting authorized duplicate check. The proposed security
models contain the illustration of security analysis scheme. As a proof of concept, contains the implementation framework of proposed
authorized duplicate check scheme and conduct experiments using these prototype. In proposed system contain authorized duplicate check
scheme sustain minimal overhead compared to normal operations.
Keywords-Deduplication,Authorized deduplication check,Hrbrid cloud,Token generation,Block level deduplication.
__________________________________________________*****_________________________________________________
I.
INTRODUCTION
RELATED WORK
_______________________________________________________________________________________
ISSN: 2321-8169
2906 2909
_______________________________________________________________________________________________
III.
SYSTEM OVERVIEW
A. Problem Statement
To develop authorized data de-duplication for protecting the
data security by including differential privileges of users in
the duplicate check and conduct test bed experiments to
evaluate the overhead of the prototype. De-duplication is
one of important data compression techniques for
eliminating duplicate copies of repeating data. For that
purpose Authorized duplication check system is used. This
paper addresses problem of privacy preserving deduplication in cloud computing and propose a new deduplication
system
supporting
for
Differential
Authorization, Authorized Duplicate Check, Unforgeability
of file token/duplicate-check token, Indistinguishability of
file token/duplicate-check token, Data Confidentiality.
B. Authorized Deduplication System
There are three entities defined in our system, that is, users,
private cloud and Secure cloud service provider(S-CSP) in
public cloud as shown in following fig.1 The S-CSP
accomplish deduplication by checking if the contents of two
files are the identical and stores only one of them. The
access right to a file is describe based on a set of privileges.
The accurate definition of a privilege varies across
applications.Token means each privilege is represented in
the form of a short message.Each file is realated with some
file tokens, which denote the tag with specified privileges. A
user computes as well as sends duplicate check tokens to the
public cloud for authorized duplicate check. Users have
access to the private cloud server and a semitrusted third
party which will help in performing deduplicable encryption
by generating file tokens for the requesting users. S-CSP.
This is an entity that contribute a
Fig.2 F(BU(C,T,P))
2907
IJRITCC | May 2015, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
ISSN: 2321-8169
2906 2909
_______________________________________________________________________________________________
IV.
SYSTEM DESIGN
The data storage server contain all the uploaded files and
DB profiler store all the metadata of the file.
Case 1:When file F1 & F2 are different the all the data will
be store in the database in different blocks.
Case 2:If the file F1 =F2 it stores only one file in the
database avoid duplication of the data.
Case 3:If F1F2 then it compare the blocks with data
storage and only different blocks of both file will be store in
the database.
B. Workflow For File Upload /Download
Authorized user can access the file from cloud storage.Only
privileged user have authority for upload and download the
file from cloud. It contain the actual flow of the file with
different operations. Following Fig 4 show the workflow of
the upload and download file from cloud storage system.
The server machine has configuration of Intel Core Duo CPU 2.4
GHz with 4GB of RAM. Heidisql used for the database storage.
When user upload file,it divide into the blocks then another same
file is uploaded at that time it compare with given database.The file
is already store it stores only the metadata of file.When to files
having same content at that time it didnt save the similar block it
store only different blocks which was not in given database with
2908
_______________________________________________________________________________________
ISSN: 2321-8169
2906 2909
_______________________________________________________________________________________________
the token for unique identification. Given uploaded file wiil be
store in encrypted format. Block level duplication reduce the
storage space as well as uploaded bandwidth as compare to file
level duplication. The block size is inversely proportional to the
time require to compare with database.The Advanced encryption
algorithm is used for encrypt and decrypt tha data,providing high
security performance.The following fig 6 shows the actual output
of proposed system.
[2]
CONCLUSION
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
Jin Li and Yan Kit Li A Hybrid cloud approach for secure authorized
dedoplication, IEEE Transaction on parallel and distributed
system,vol:pp:99 2014
M. Bellare, S. Keelveedhi, and T. Ristenpart. Dupless: Server aided
encryption for deduplicated storage. In USENIX Security
Symposium, 2013.
J. Yuan and S. Yu. Secure and constant cost public cloud storage
auditing with deduplication .IACR Cryptology ePrint Archive, 2013.
J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou. Secure
deduplication with efficient and
reliable convergent key
management. In IEEE Transactions on Parallel and Distributed
Systems, 2013.
M. Bellare, S. Keelveedhi, and T. Ristenpart. Message-locked
encryption and secure deduplication. In EUROCRYPT, pages 296
312, 2013.
J. Xu, E.-C. Chang and J. Zhou. Weak leakage-resilient client-side
deduplication of encrypted data in cloud storage. In ASIACCS, pages
195206, 2013.
C. Ng and P. Lee. Revdedup: A reverse deduplication storage system
optimized for reads to latest backups. In Proc. of APSYS, Apr 2013.
W. K. Ng, Y. Wen, and H. Zhu. Private data deduplication protocols
in cloud storage. In S Ossowski and P. 2012.
R. D. Pietro and A. Sorniotti . Boosting efficiency and security in
proof of ownership for deduplication. In H. Y. Youm and Y. Won,
editors, ACM Symposium on Information, Computer and
Communications Security2012.
S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider. Twin clouds:
An architecture for secure cloud computing. In Workshop on
Cryptography and Security in Clouds (WCSC 2011), 2011.
S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg. Proofs of
ownership in remote storage systems. In Y. Chen, G. Danezis, and V.
Shmatikov, editors, ACM Conference on Computer and
Communications Security, pages 491500. ACM, 2011.
K. Zhang, X. Zhou, Y. Chen, X. Wang, and Y. Ruan. Sedic: privacy
aware data intensive computing on hybrid clouds. In Proceedings of
the 18th ACM conference on Computer and communications security,
CCS11, pages 515526, New York, NY, USA, 2011. ACM.
A. Rahumed , H. C. H. Chen, Y. Tang, P. P. C. Lee, and J. C. S. Lui.
A secure cloud backup system with assured deletion and version
control. In 3rd International Workshop on Security in Cloud
Computing, 2011.
M. Bellare, C. Namprempre , and G. Neven. Security proofs for
identity-based identification and signature schemes. J. Cryptology,
2009.
M. Bellare and A. Palacio. Gq and schnorr identification schemes:
Proofs of security against impersonation under active and concurrent
attacks. In CRYPTO, pages 162177,2002
2909
IJRITCC | May 2015, Available @ http://www.ijritcc.org
_______________________________________________________________________________________